Sciweavers

654 search results - page 27 / 131
» Linearity Testing in Characteristic Two
Sort
View
130
Voted
CCS
2003
ACM
15 years 7 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
82
Voted
EUSFLAT
2003
206views Fuzzy Logic» more  EUSFLAT 2003»
15 years 4 months ago
Analysis of multi-product break-even with uncertain information
We revise the classic methodology to find the multi-product break-even point. In the current paper we propose a solution to the problem under uncertainty conditions, based on DurÃ...
Luisa L. Lazzari, María Silvia Moriñ...
126
Voted
ICPR
2004
IEEE
16 years 3 months ago
Multiple-Exemplar Discriminant Analysis for Face Recognition
Face recognition is characteristically different from regular pattern recognition and, therefore, requires a different discriminant analysis other than linear discriminant analysi...
Rama Chellappa, Shaohua Kevin Zhou
ICRA
1998
IEEE
106views Robotics» more  ICRA 1998»
15 years 6 months ago
A Comparative Study of Vision-Based Lateral Control Strategies for Autonomous Highway Driving
ct This paper willpresent the resultsof a comparative study of a set of vision-based control strategies that have been applied to the problem of steering an autonomous vehicle alon...
Jana Kosecka, Robert Blasi, Camillo J. Taylor, Jit...
123
Voted
APCCAS
2006
IEEE
206views Hardware» more  APCCAS 2006»
15 years 6 months ago
On the Properties And Design of Stable IIR Transfer Functions Generated Using Fibonnaci Numbers
This paper considers z-domain transfer functions whose denominator polynomial possesses the property that the coefficient of zi is greater than the coefficient of zi-1 . Such trans...
Christian S. Gargour, Venkat Ramachandran, Ravi P....